iotc iotc

  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
    • linkedin
    • facebook
    • twitter
    • YouTube
  • Registration Registration

  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
Jp En
  • NOMイベント情報
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020
  • よくあるご質問
  • FAQ
    • linkedin
    • facebook
    • twitter
    • YouTube
Jp En
  • Outline Outline
  • NAGOYA NAGOYA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • TOKYO TOKYO
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • OSAKA OSAKA
    Conference Conference
    Exhibition Exhibition
    Sponsor Sponsor
  • FAQ
    • Registration Registration

  • NOM'S EVENTS
    業務自動化カンファレンス 2020 金融ICTカンファレンス 2020 Security Days 2020 製造業向けIoT活用カンファレンス 2020 次世代自動運転・コネクテッドカー・カンファレンス 2020

Tokyo Session

  • All
  • 3.11(Tue)
  • 3.12(Wed)
  • 3.13(Thu)
  • 3.14(Fri)
  • lunch

Search (possible multiple choice)

Keyword

3.14(Fri)

  • RoomA
  • RoomB
  • RoomC
  • 5F
09:00 | 09:30
  • A4-01

    Cyber threats in the AI era

    • Speaker

      NTT Corporation

      Chief Cybersecurity Strategist
      Security and Trust Office

      Mihoko Matsubara

    • Ransomware measures
    • AI security
    • Business Email Compromise
09:40 | 10:20
  • A4-02

    Coming soon

    • Speaker

      Canon Marketing Japan Inc.

    • Speaker

      ESET Japan Inc.

    • XDR
    • Managed security

    Presented byCanon Marketing Japan Inc.

  • WS4-01

    Coming soon

    • Targeted Threat / Cyber Attack
    • Measures against information leakage
    • Human resource development
    • Workshop
10:30 | 11:10
  • A4-03

    Generative AI for Security Testing: Trusted by Global Leaders
    ~ Say Goodbye to Manual Reviews ~

    • Speaker

      Aeye Security Lab Inc.

      Executive Officer&Head of Customer Experience

      Teppei Sekine

    • Cloud security
    • Vulnerability measures / Tampering measures
    • Application Security

    Presented byAeye Security Lab Inc.

11:20 | 12:00
  • A4-04

    Coming soon

    • Speaker

      Cloudbase Inc.

    • Cloud security
    • Vulnerability measures / Tampering measures
    • Monitoring and detection

    Presented byCloudbase Inc.

12:15 | 12:55
  • A4-05

    Coming soon

    • Speaker

      CrowdStrike Japan GK

      Michio Mori

    • Targeted Threat / Cyber Attack
    • SOC / Incident Response
    • Security auditing / system audit

    Presented byCrowdStrike Japan GK

13:30 | 14:10
  • A4-06

    Revolutionizing Network Security with EntraID Suite and SecurityCopilot

    • Speaker

      TIS Inc.

      Section Chief
      Security Solutions Department

      Masashi Oguri

    • Cloud security
    • Authentication / Identity Management
    • Zero trust security model

    Presented byTIS Inc. / Microsoft Japan Co., Ltd.

  • B4-06

    Coming soon

    • Speaker

      MARUBENI IT SOLUTIONS INC.

    • Speaker

      International Christian University

    • Zero trust security model

    Presented byMARUBENI IT SOLUTIONS INC.

  • C4-06

    Coming soon

    • Speaker

      National center of Incident readiness and Strategy for Cybersecurity

      Counsellor
      Incident Handling and External Collaboration Unit

      Matsumoto Takashi

    • Critical Infrastructure Security
  • Closed

    WS4-02

    Lessons in Preventing Fraudulent and Deceptive Use of Brands: Practical Exercises and Insights from Tabletop Exercise Kits

    • PSIRT / CSIRT
    • Human resource development
    • Phishing Attack
    • Workshop
14:25 | 15:05
  • A4-07

    Three Key Actions You Should Take Now to Avoid Ransomware Attacks and Minimize Damage

    • Speaker

      Japan Business Systems, Inc.

      Cloud Managed Services Div.

      Shohei Hanashita

    • Ransomware measures
    • SOC / Incident Response
    • Software chain Attack

    Presented byJapan Business Systems, Inc. / Microsoft Japan Co., Ltd.

  • B4-07

    De-VPN and VDI Strategies to Protect Your Organization from Supply Chain Attacks

    • Speaker

      Soliton Systems K.K.

      Manager
      Product Promotion Department, IT Security Division

      Kazuki Mitsui

    • Targeted Threat / Cyber Attack
    • Measures against information leakage
    • Container security

    Presented bySoliton Systems K.K.

  • C4-07

    Next Generation Micro-segmentation with AI Technology
    〜Private Cloud - More Secure

    • Speaker

      Broadcom

    • Targeted Threat / Cyber Attack
    • Measures against information leakage
    • Critical Infrastructure Security

    Presented byVMware K.K. (Broadcom)

15:20 | 16:00
  • A4-08

    Get the most out of Microsoft Sentinel with generative AI and automation!
    95% reduction in security alert response operations!

    • Speaker

      NTT Communications Corporation

      General Manager
      Managed & Security Services , Security Servicies

      Yosuke Tobata

    • Endpoint Security
    • XDR
    • SOC / Incident Response

    Presented byNTT Communications Corporation / Microsoft Japan Co., Ltd.

  • B4-08

    Coming soon

    • Speaker

      3-shake Inc.

    • Vulnerability measures / Tampering measures
    • Application Security
    • Critical Infrastructure Security

    Presented by3-shake Inc.

  • C4-08

    Limitations and Dangers of Password Management/Now is the Era of Fully Passwordless

    • Speaker

      KDDI Digital Security Inc.

      Deputy General Manager
      CReation Of the Security&Safety Division

      Kenji Okoshi

    • Measures against information leakage
    • Authentication / Identity Management
    • Application Security

    Presented byKDDI Digital Security Inc.

16:15 | 16:55
  • A4-09

    Step ahead of attackers: Proactive Security made possible by the latest Threat Intelligence

    • Speaker

      Recorded Future Japan KK

      Sr Presales Engineer

      Tomoyuki Matsuda

    • Targeted Threat / Cyber Attack
    • PSIRT / CSIRT
    • SOC / Incident Response

    Presented byRecorded Future Japan KK

  • B4-09

    Balancing Security and Sustainability: The Latest Global Trends in Data Erasure

    • Speaker

      Blancco Technology Group / Blancco Japan Inc.

      Regional Director, Japan

      Motoi Mimatsu

    • Endpoint Security
    • Measures against information leakage
    • Zero trust security model

    Presented byBlancco Japan Inc.

  • C4-09

    CTC Discusses Vulnerability Management Strategies in Agile Development Achieved Through ASPM

    • Speaker

      IssueHunt

      CEO

      Kazumasa Yokomizo

    • Measures against information leakage
    • Software chain Attack
    • SBOM

    Presented byIssueHunt K.K.

  • WS4-04

    Coming soon

    • PSIRT / CSIRT
    • Security auditing / system audit
    • Human resource development
    • Workshop
17:10 | 17:50
  • A4-10

    Solution for prevention of leakage of technologies, for trade secret management, for reducing Human Vulnerability and for Human Risk Management

    • Speaker

      Leo United Ginza Law Office

      Attorney

      Leona Ohki

    • Measures against information leakage
    • Vulnerability measures / Tampering measures
    • Monitoring and detection

    Presented byLeo United Ginza Law Office

  • B4-10

    Cyber Resilience for Endpoints: Rapid Recovery from Threats with Absolute Secure Endpoint

    • Speaker

      Absolute Software K.K.

      Senior System Engineer

      Taira Fujita

    • Speaker

      Internet Initiative Japan Inc.

      DWP Solution Section
      Business Promotion Department
      Service Product Business Division

      Kohei Matsuura

    • Endpoint Security
    • Zero trust security model
    • Application Security

    Presented byAbsolute Software K.K. / Internet Initiative Japan Inc.

  • C4-10

    EDR challenges faced by organizations | A new security operations' approach in an era where all organizations are adopting EDR (TBD)

    • Speaker

      WithSecure™ Japan

      Product Marketing Manager
      Cyber Security Products & Services

      Yoshimasa Kanda

    • Targeted Threat / Cyber Attack
    • Ransomware measures
    • XDR

    Presented byWithSecure KK

17:55 | 18:25
  • A4-11

    What is ASM for visualizing attack surfaces?
    - Interpretation and definition of ASM from a practitioner's perspective -

    • Speaker

      Secure Sky Technology Inc.

      Specialist

      Yu Iwama

    • Speaker

      BalaenaTech Co., Ltd.

      Company President

      Masashi Kouda

    • Targeted Threat / Cyber Attack
    • Vulnerability measures / Tampering measures
    • Software chain Attack
  • B4-11

    Coming soon

    • Speaker

      Bank of Japan

    • Targeted Threat / Cyber Attack
    • Critical Infrastructure Security
  • C4-11

    Amendement of Act on the Protection of Personal Information and its Impact on Corporate Practices

    • Speaker

      Ushijima & Partners

      Partner

      Hiroyasu Kageshima

    • GDPR / Privacy Mark / ISMS / Laws of the Decree
  • Privacy Policy

[24年秋開催]Security Days Fall 2024

Copyright (c) NANO OPT Media, Inc. All rights reserved.